CVE-2020-17518

Scores

EPSS

0.938high93.8%
0%20%40%60%80%100%

Percentile: 93.8%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Description

Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit a5264a6f41524afe8ceadf1d8ddc8c80f323ebc4 from apache/flink:master.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22CWE-23

Exploits

Exploit ID: CVE-2020-17518

Source: github-poc

URL: https://github.com/rakjong/Flink-CVE-2020-17518-getshell

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: flink

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*",      "versionEndExcluding": "1.11.3",      "versionStartIncluding": "1.5.1",      "vulnerable": true    }  ],...

Source: nvd

End of list